Skip to content

Commit 52a85ab

Browse files
author
awstools
committed
feat(client-eks): Release for EKS Pod Identity Cross Account feature and disableSessionTags flag.
1 parent 125f9f6 commit 52a85ab

8 files changed

+233
-61
lines changed

clients/client-eks/src/commands/CreateClusterCommand.ts

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,9 @@ export interface CreateClusterCommandOutput extends CreateClusterResponse, __Met
4545
* <p>You can use the <code>endpointPublicAccess</code> and
4646
* <code>endpointPrivateAccess</code> parameters to enable or disable public and
4747
* private access to your cluster's Kubernetes API server endpoint. By default, public access is
48-
* enabled, and private access is disabled. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS Cluster
48+
* enabled, and private access is disabled. The
49+
* endpoint domain name and IP address family depends on the value of the
50+
* <code>ipFamily</code> for the cluster. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS Cluster
4951
* Endpoint Access Control</a> in the <i>
5052
* <i>Amazon EKS User Guide</i>
5153
* </i>. </p>

clients/client-eks/src/commands/CreatePodIdentityAssociationCommand.ts

Lines changed: 22 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -35,15 +35,27 @@ export interface CreatePodIdentityAssociationCommandOutput
3535
/**
3636
* <p>Creates an EKS Pod Identity association between a service account in an Amazon EKS cluster and an IAM role
3737
* with <i>EKS Pod Identity</i>. Use EKS Pod Identity to give temporary IAM credentials to
38-
* pods and the credentials are rotated automatically.</p>
38+
* Pods and the credentials are rotated automatically.</p>
3939
* <p>Amazon EKS Pod Identity associations provide the ability to manage credentials for your applications, similar to the way that Amazon EC2 instance profiles provide credentials to Amazon EC2 instances.</p>
40-
* <p>If a pod uses a service account that has an association, Amazon EKS sets environment variables
41-
* in the containers of the pod. The environment variables configure the Amazon Web Services SDKs,
40+
* <p>If a Pod uses a service account that has an association, Amazon EKS sets environment variables
41+
* in the containers of the Pod. The environment variables configure the Amazon Web Services SDKs,
4242
* including the Command Line Interface, to use the EKS Pod Identity credentials.</p>
43-
* <p>Pod Identity is a simpler method than <i>IAM roles for service
43+
* <p>EKS Pod Identity is a simpler method than <i>IAM roles for service
4444
* accounts</i>, as this method doesn't use OIDC identity providers.
45-
* Additionally, you can configure a role for Pod Identity once, and reuse it across
45+
* Additionally, you can configure a role for EKS Pod Identity once, and reuse it across
4646
* clusters.</p>
47+
* <p>Similar to Amazon Web Services IAM behavior, EKS Pod Identity associations are eventually consistent,
48+
* and may take several seconds to be effective after the initial API call returns
49+
* successfully. You must design your applications to account for these potential delays.
50+
* We recommend that you don’t include association create/updates in the
51+
* critical, high-availability code paths of your application. Instead, make changes in a
52+
* separate initialization or setup routine that you run less frequently.</p>
53+
* <p>You can set a <i>target IAM role</i> in the same or a different
54+
* account for advanced scenarios. With a target role, EKS Pod Identity automatically performs two
55+
* role assumptions in sequence: first assuming the role in the association that is in this
56+
* account, then using those credentials to assume the target IAM role. This process
57+
* provides your Pod with temporary credentials that have the permissions defined in the
58+
* target role, allowing secure access to resources in another Amazon Web Services account.</p>
4759
* @example
4860
* Use a bare-bones client and the command you need to make an API call.
4961
* ```javascript
@@ -59,6 +71,8 @@ export interface CreatePodIdentityAssociationCommandOutput
5971
* tags: { // TagMap
6072
* "<keys>": "STRING_VALUE",
6173
* },
74+
* disableSessionTags: true || false,
75+
* targetRoleArn: "STRING_VALUE",
6276
* };
6377
* const command = new CreatePodIdentityAssociationCommand(input);
6478
* const response = await client.send(command);
@@ -76,6 +90,9 @@ export interface CreatePodIdentityAssociationCommandOutput
7690
* // createdAt: new Date("TIMESTAMP"),
7791
* // modifiedAt: new Date("TIMESTAMP"),
7892
* // ownerArn: "STRING_VALUE",
93+
* // disableSessionTags: true || false,
94+
* // targetRoleArn: "STRING_VALUE",
95+
* // externalId: "STRING_VALUE",
7996
* // },
8097
* // };
8198
*

clients/client-eks/src/commands/DeletePodIdentityAssociationCommand.ts

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -61,6 +61,9 @@ export interface DeletePodIdentityAssociationCommandOutput
6161
* // createdAt: new Date("TIMESTAMP"),
6262
* // modifiedAt: new Date("TIMESTAMP"),
6363
* // ownerArn: "STRING_VALUE",
64+
* // disableSessionTags: true || false,
65+
* // targetRoleArn: "STRING_VALUE",
66+
* // externalId: "STRING_VALUE",
6467
* // },
6568
* // };
6669
*

clients/client-eks/src/commands/DescribePodIdentityAssociationCommand.ts

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -64,6 +64,9 @@ export interface DescribePodIdentityAssociationCommandOutput
6464
* // createdAt: new Date("TIMESTAMP"),
6565
* // modifiedAt: new Date("TIMESTAMP"),
6666
* // ownerArn: "STRING_VALUE",
67+
* // disableSessionTags: true || false,
68+
* // targetRoleArn: "STRING_VALUE",
69+
* // externalId: "STRING_VALUE",
6770
* // },
6871
* // };
6972
*

clients/client-eks/src/commands/UpdateClusterConfigCommand.ts

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,8 @@ export interface UpdateClusterConfigCommandOutput extends UpdateClusterConfigRes
4848
* <li>
4949
* <p>You can also use this API operation to enable or disable public and private
5050
* access to your cluster's Kubernetes API server endpoint. By default, public access is
51-
* enabled, and private access is disabled. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS
52-
* cluster endpoint access control</a> in the
51+
* enabled, and private access is disabled. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">
52+
* Cluster API server endpoint</a> in the
5353
* <i>
5454
* <i>Amazon EKS User Guide</i>
5555
* </i>.</p>

clients/client-eks/src/commands/UpdatePodIdentityAssociationCommand.ts

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -33,10 +33,23 @@ export interface UpdatePodIdentityAssociationCommandOutput
3333
__MetadataBearer {}
3434

3535
/**
36-
* <p>Updates a EKS Pod Identity association. Only the IAM role can be changed; an association can't be moved
36+
* <p>Updates a EKS Pod Identity association. In an update, you can change the IAM role, the target IAM role, or <code>disableSessionTags</code>.
37+
* You must change at least one of these in an update. An association can't be moved
3738
* between clusters, namespaces, or service accounts. If you need to edit the namespace
3839
* or service account, you need to delete the association and then create a new
3940
* association with your desired settings.</p>
41+
* <p>Similar to Amazon Web Services IAM behavior, EKS Pod Identity associations are eventually consistent,
42+
* and may take several seconds to be effective after the initial API call returns
43+
* successfully. You must design your applications to account for these potential delays.
44+
* We recommend that you don’t include association create/updates in the
45+
* critical, high-availability code paths of your application. Instead, make changes in a
46+
* separate initialization or setup routine that you run less frequently.</p>
47+
* <p>You can set a <i>target IAM role</i> in the same or a different
48+
* account for advanced scenarios. With a target role, EKS Pod Identity automatically performs two
49+
* role assumptions in sequence: first assuming the role in the association that is in this
50+
* account, then using those credentials to assume the target IAM role. This process
51+
* provides your Pod with temporary credentials that have the permissions defined in the
52+
* target role, allowing secure access to resources in another Amazon Web Services account.</p>
4053
* @example
4154
* Use a bare-bones client and the command you need to make an API call.
4255
* ```javascript
@@ -48,6 +61,8 @@ export interface UpdatePodIdentityAssociationCommandOutput
4861
* associationId: "STRING_VALUE", // required
4962
* roleArn: "STRING_VALUE",
5063
* clientRequestToken: "STRING_VALUE",
64+
* disableSessionTags: true || false,
65+
* targetRoleArn: "STRING_VALUE",
5166
* };
5267
* const command = new UpdatePodIdentityAssociationCommand(input);
5368
* const response = await client.send(command);
@@ -65,6 +80,9 @@ export interface UpdatePodIdentityAssociationCommandOutput
6580
* // createdAt: new Date("TIMESTAMP"),
6681
* // modifiedAt: new Date("TIMESTAMP"),
6782
* // ownerArn: "STRING_VALUE",
83+
* // disableSessionTags: true || false,
84+
* // targetRoleArn: "STRING_VALUE",
85+
* // externalId: "STRING_VALUE",
6886
* // },
6987
* // };
7088
*

0 commit comments

Comments
 (0)